ITM 301 Lecture Notes - Lecture 9: Black Hat, Data Loss Prevention Software, Usb Flash Drive
Document Summary
Security risks: hacker, originally meant someone who masters the inner workings of computer hardware and software in an effort to better understand them. Today, hacker is used to describe an individual who gains unauthorized access to systems: hacker categories, white hat hacker i t security experts hired by organizations to identify security vulnerabilities. Sometimes called an ethical hacker: black hat hacker groups or individuals that cause damage, steal data, or compromise privacy, gray hat hacker abide by a code of ethics all their own. Might engage in illegal activity but their intent is to educate and assist: vulnerability, weakness of a system, process, or architecture. Exploit: means of taking advantage of a vulnerability. Exploit before software developer is aware of the vulnerability. People risks: more than half of all security breaches are caused by human errors, ignorance, and omissions. Tailgating: the attacker uses authorized people to get unauthorize entry in an organization.